{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:33:14Z","timestamp":1742913194110,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642315992"},{"type":"electronic","value":"9783642316005"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-31600-5_12","type":"book-chapter","created":{"date-parts":[[2012,9,21]],"date-time":"2012-09-21T14:58:37Z","timestamp":1348239517000},"page":"119-128","source":"Crossref","is-referenced-by-count":8,"title":["An Analysis of Privacy Preservation Techniques in Data Mining"],"prefix":"10.1007","author":[{"given":"Abhishek","family":"Sachan","sequence":"first","affiliation":[]},{"given":"Devshri","family":"Roy","sequence":"additional","affiliation":[]},{"given":"P. V.","family":"Arun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Clifton, C.: Encyclopedia Britannica: Definition of Data Mining (2010), \n                    http:\/\/www.britannica.com\/EBchecked\/topic\/1056150\/data-mining\n                   (retrieved December 09, 2010)"},{"issue":"10","key":"12_CR2","doi-asserted-by":"publisher","first-page":"49","DOI":"10.5120\/6303-8516","volume":"44","author":"A. Sachan","year":"2012","unstructured":"Sachan, A., Roy, D.: TGPM: Terrorist Group Prediction Model for Counter Terrorism. International Journal of Computer Applications (0975 \u2013 8887)\u00a044(10), 49\u201352 (2012)","journal-title":"International Journal of Computer Applications (0975 \u2013 8887)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Laur, S., Lipmaa, H., Mielik\u00e4inen, T.: Cryptographically private support vector machines. In: Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 618\u2013624 (2006)","DOI":"10.1145\/1150402.1150477"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Yu, P.S.: Privacy-Preserving Data Mining: Models and Algorithms. Advances in Database Systems, Springer (2008) 0387709916","DOI":"10.1007\/978-0-387-70992-5"},{"key":"12_CR5","unstructured":"Gorg\u00f4nio, F.L., et al.: Privacy-Preserving Clustering on Distributed Databases: A Review and Some Contributions. Intechopen (2011)"},{"key":"12_CR6","unstructured":"Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Proceedings of International Conference of Data Mining (ICDM 2005), pp. 589\u2013592 (2005)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Liu, K., Kargupta, H., Ryan, J.: Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering (TKDE), 92\u2013106 (January 2006)","DOI":"10.1109\/TKDE.2006.14"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Kou, G., Peng, Y., Shi, Y., Chen, Z.: Privacy-preserving data mining of medical data using data separation\u2013based techniques. Data Science Journal\u00a06(supp.) (July 30, 2007)","DOI":"10.2481\/dsj.6.S429"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Poovammal, E., Ponnavaikko, M.: An Improved Method for Privacy Preserving Data Mining. In: IEEE International Advance Computing Conference Patiala, India (2009)","DOI":"10.1109\/IADCC.2009.4809231"},{"key":"12_CR10","unstructured":"Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: Proc. of DKMD 2002 (June 2002)"},{"key":"12_CR11","volume-title":"Privacy-Preserving Data Mining","author":"E. Bertino","year":"2008","unstructured":"Bertino, E., Lin, D., Jiang, W.: A Survey of Quantification of Privacy Preserving Data Mining Algorithm. In: Privacy-Preserving Data Mining. Springer, US (2008)"},{"key":"12_CR12","unstructured":"Narmada, V., Narasimha Swamy, B., Lokesh Sai Kumar, D.: An enhanced security algorithm for distributed databases in privacy preserving data bases. International Journal of Advanced Engineering Sciences and Technologies (IJAEST), 219\u2013225 (2011)"},{"key":"12_CR13","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1145\/1150402.1150499","volume-title":"Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"R.C. Wong","year":"2006","unstructured":"Wong, R.C., Li, J., Fu, A.W., et al.: (\u03b1, k)-Anonymity: an enhaned k-anonymity model for privacy-preserving data publishing. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 754\u2013759. ACM Press, New York (2006)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Singh, M.D., Radha Krishna, P., Saxena, A.: A Privacy Preserving Jaccard Similarity Function for Mining Encrypted Data. In: Proceedings of IEEE Conference (2009)","DOI":"10.1109\/TENCON.2009.5395869"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: The complexity of optimal k-anonymity. In: ACM PODS Conference (2004)","DOI":"10.1145\/1055558.1055591"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Yu, P.S.: Privacy-Preserving Data Mining: A Survey. In: Handbook of Database Security, pp. 431\u2013460. Springer (2008)","DOI":"10.1007\/978-0-387-48533-1_18"},{"key":"12_CR17","unstructured":"Martin, D., et al.: Worst Case Background Knowledge. In: ICDE Conference (2007)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., et al.: l-Diversity: Privacy Beyond k-Anonymity. In: ICDE (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Wang, J., Luo, Y., Zhao, Y., Le, J.: A Survey on Privacy Preserving Data Mining. In: First International Workshop on Database Technology and Applications (2009)","DOI":"10.1109\/DBTA.2009.147"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Personalized Privacy Preservation. In: SIGMOD (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: Proceedings of the ACM SIGMOD Conference (2000)","DOI":"10.1145\/342009.335438"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R., Thomas, D.: Privacy-Preserving OLAP. In: Proceedings of the ACM SIGMOD Conference (2005)","DOI":"10.1145\/1066157.1066187"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Polat, H., Du, W.: SVD-based collaborative filtering with privacy. In: ACM SAC Symposium (2005)","DOI":"10.1145\/1066677.1066860"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Du, W., Zhan, Z.: Using Randomized Response Techniques for Privacy-Preserving Data Mining. In: SIGKDD, pp. 505\u2013510 (August 2003)","DOI":"10.1145\/956750.956810"},{"key":"12_CR25","unstructured":"Zhang, X., Bi, H.: Research on Privacy Preserving Classification Data Mining Based on Random Perturbation. In: International Conference on Information, Networking and Automation, ICINA (2010)"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-540-24741-8_12","volume-title":"Advances in Database Technology - EDBT 2004","author":"C.C. Aggarwal","year":"2004","unstructured":"Aggarwal, C.C., Yu, P.S.: A Condensation Approach to Privacy Preserving Data Mining. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K. (eds.) EDBT 2004. LNCS, vol.\u00a02992, pp. 183\u2013199. Springer, Heidelberg (2004)"},{"key":"12_CR27","unstructured":"Nayak, G., Devi, S.: A Survey on Privacy Preserving Data Mining: Approaches and Techniques. International Journal of Engineering Science and Technology (IJEST), 2127\u20132133 (2011)"},{"key":"12_CR28","unstructured":"Wang, K., Fung, B.C.M., Yu, P.S.: Template-based privacy preservation in classification problems. In: ICDM, pp. 466\u2013473 (2005)"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Pinkas, B.: Cryptographic Techniques for Privacy-Preserving Data Mining. ACM SIGKDD Explorations\u00a04(2) (2002)","DOI":"10.1145\/772862.772865"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Computing and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31600-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T19:35:11Z","timestamp":1676576111000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-31600-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642315992","9783642316005"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31600-5_12","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}